- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Other titles in the For Mere Mortals series:
Securing PHP Web Applications (For Mere Mortals)by Tricia Ballad
Synopses & Reviews
Easy, Powerful Code Security Techniques for Every PHP Developer
Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don’t be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, and best practices you need to write rock-solid PHP code and harden the PHP software you’re already using.
Drawing on more than fifteen years of experience in Web development, security, and training, Tricia and William Ballad show how security flaws can find their way into PHP code, and they identify the most common security mistakes made by PHP developers. The authors present practical, specific solutions–techniques that are surprisingly easy to understand and use, no matter what level of PHP programming expertise you have.
Securing PHP Web Applications covers the most important aspects of PHP code security, from error handling and buffer overflows to input validation and filesystem access. The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software’s performance or your own productivity.
Tricia and William Ballad demystify PHP security by presenting realistic scenarios and code examples, practical checklists, detailed visuals, and more. Whether you write Web applications professionally or casually, or simply use someone else’s PHP scripts, you need this book–and you need it now, before the hackers find you!
Book News Annotation:
T. Ballad, a web developer and noted technology writer, has teamed with W. Ballad, an expert in information technology, to provide this guide to blocking hackers in PHP web applications. Designed specifically for web developers who have little or no experience in software security, this book offer explicit instructions on how to write "rock-solid" code that will defend a PHP application against session hijacking, fixation, poisoning attacks and other security breaches. Code examples, real-life scenarios and practical checklists are also included to ensure the enforcement of strict authentification and file system access. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)
About the Author
Tricia Ballad spent several years as a Web applications developer on the LAMP (Linux, Apache, MySQL, PHP/Perl) platform before becoming a full-time writer and technical editor. She currently writes online courseware on various technology topics.
William Ballad has worked in every aspect and at all levels of information technology, from hardware maintenance at a small mom-and-pop ISP to architect of Windows-based and heterogeneous networks at some of the world’s largest corporations. An active member of the IT security community for many years, he recently led an effort to counter an international hacker group exploiting OptionCart, a widely used e-commerce system.
The Ballads have collaborated on several Web development books, including PHP & MySQL Web Development All-in-One Desk Reference for Dummies (Wiley Publishing, 2008).
Table of Contents
Part I: Web Development Is a Blood Sport–Don’t Wander onto the Field without a Helmet
Chapter 1: Security Is a Server Issue and Other Myths
Part II: Is That Hole Really Big Enough to Drive a Truck Through?
Chapter 2: Error HandlingChapter 3: System Calls
Part III: What’s in a Name? More than You Expect
Chapter 4: Buffer Overflows and Variable Sanitation
Chapter 5: Input Validation
Chapter 6: Filesystem Access: Accessing the Filesystem for Fun and Profit
Part IV: “Aw, Come On, Man, You Can Trust Me”
Chapter 7: Authentication
Chapter 8: Encryption
Chapter 9: Session Security
Chapter 10: Cross-Site Scripting
Part V: Locking Up for the Night
Chapter 11: Securing Apache and MySQL
Chapter 12: Securing IIS and SQL Server
Chapter 13: Securing PHP on the Server
Chapter 14: Introduction to Automated Testing
Chapter 15: Introduction to Exploit Testing
Part VI: “Don’t Get Hacked” Is Not a Viable Security Policy
Chapter 16: Plan A: Designing a Secure Application from the Beginning
Chapter 17: Plan B: Plugging the Holes in Your Existing Application
What Our Readers Are Saying
Computers and Internet » Internet » General